Hajime Watanabe

Orcid: 0000-0002-0011-1638

According to our database1, Hajime Watanabe authored at least 28 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Attribute-Based Encryption for Range Attributes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection.
IEEE Access, 2018

2017
Mutual Authentication Protocol for HTTP: Cryptographic Algorithms Based on the Key Agreement Mechanism 3 (KAM3).
RFC, April, 2017

Mutual Authentication Protocol for HTTP.
RFC, April, 2017

HTTP Authentication Extensions for Interactive Clients.
RFC, January, 2017

2016
Localization Attacks Using Matrix and Tensor Factorization.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Location prediction attacks using tensor factorization and optimal defenses.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Proceedings of the SECRYPT 2013, 2013

2011
Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

On advanced cryptographic techniques for information security of smart grid AMI.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

An improvement of discrete Tardos fingerprinting codes.
Des. Codes Cryptogr., 2009

PAKE-based mutual HTTP authentication for preventing phishing attacks
CoRR, 2009

PAKE-based mutual HTTP authentication for preventing phishing attacks.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
Proceedings of the Advances in Information and Computer Security, 2008

2007
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A New Variant for an Attack Against RSA Signature Verification Using Parameter Field.
Proceedings of the Public Key Infrastructure, 2007

A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
Proceedings of the Applied Algebra, 2007

2006
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
CoRR, 2006

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006

2003
A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized <i>c</i>-Secure CRT Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2002
Watermarking method for extracting embedded data without original image.
Proceedings of the Visual Communications and Image Processing 2002, 2002

An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

1997
A secure code for recipient watermarking against conspiracy attacks by all users.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...